Xtreme Podcast: Has Big Data been overshadowed by dark data?

Welcome to the TechGenix weekly installment of the Xtreme Minute! This is a quick summary of what you can expect in today’s TechGenix Xtreme Podcast with Louise Chalupiak and Peter King, including links to all of the latest hot tech topics.

Today we begin with an article from Twain Taylor, titled Still using legacy security tools? Get ready for disaster. Twain describes the cloud as a mysterious galaxy of networks and points out that many of us are still relying on our on-premises security tools even when deploying to the cloud. Thanks to the dark web, anyone can grab tools to create a cyberattack. Now, more than ever, it is critical to ensure that our security tools are in alignment with our IT strategy.

Our next article up for discussion is from Mitch Tulloch, titled Shedding light on dark data: Is it an opportunity or risk? Without question, we have become very good at collecting data. What we aren’t yet so good at is the dissemination and utilization of that data. In the process, we may have opened ourselves up to any number of new security risks and may even be unknowingly breaching privacy laws.

Finally, we go to the mysterious Stephen M.W. and his article titled, 10 hacking stats every business leader and IT pro must know. Stephen uses a list of statistical data to put into perspective how vulnerable we all are when it comes to malware and hacking. Big surprise, one of the culprits originates from our excessive use of email, but it doesn’t stop there.

Click here to join the TechGenix newsletter and keep up-to-the-minute on what’s trending in technology.

Click here to send us your comments and stories. We love the read and we always learn from them.

Louise Chalupiak

Louise is a cynical and often irritating project manager currently residing in Calgary, Alberta, Canada who is not personally responsible for anything oil sands related. She often eats popcorn for dinner and fears that her dog judges her. Special skills include milking a cow as well as the ability to uncork a wine bottle without the use of a corkscrew.

Share
Published by
Louise Chalupiak

Recent Posts

Review: Identity verification solution Specops Secure Service Desk

Specops Secure Service Desk is an innovative solution for positively identifying a user who calls…

13 hours ago

Apple Silicon: What it means for the world of personal computing

Apple is moving away from Intel processors to use its own Apple Silicon processors to…

17 hours ago

RAID 0 vs. RAID 1: When to use each level and why

Two of the most popular RAID levels for improving performance are RAID 0 and RAID…

20 hours ago

Got cybersecurity tools? Good. Got too many? That may be a problem

Strength in numbers may not apply to cybersecurity tools. In fact, using too many tools…

2 days ago

Getting started with System Center Operations Manager

System Center Operations Manager can monitor your IT resources, but the tool is only as…

2 days ago

Microsoft 365 administration: Creating DNS records for email security

Microsoft 365 administration has many facets, but none is more important than configuring email. Here’s…

2 days ago